Miscellaneous Flashcards

1
Q

What is Measurable Security ?

A

“All aspects of security mechanisms function, provide a clear benefit, & have metrics that can be recorded & analyzed.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ensures proper creation, implementation, & enforcement of a security policy?

A

Security Management Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which kind of approach to building security policy is generally frowned upon by experts?

A

A bottom-up approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some elements of Threat Mode Diagrams ?

A
  • Trust Boundaries
  • Dataflow Paths
  • Input Points
  • Privileged Operations
  • Details about Security Stance/Approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DREAD ?

A

Rating for threats: Disaster, Reproducibility, Exploitability, Affected Assets, Discoverability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the focus of Risk Assessment ?

A

Assets, and potential loss of or damage to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three Threat Modeling approaches?

A
  • Focused on Assets
  • Focused on Attackers
  • Focuses on Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is STRIDE ?

A

Microsoft Threat Model.
- Spoofing
- Tampering
- Repudiation
- Info Disclosure
- DoS
- Elevation of Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PASTA ?

A

Risk-centric Threat Model
Stage 1: Definition of objectives (DO)
Stage 2: Define Tech Scope (DTS)
Stage 3: App Decomposition & Analysis (ADA)
Stage 4: Threat Analysis (TA)
Stage 5: Weakness & Vulnerability Analysis (WVA)
Stage 6: Attack Modeling & Simulation (AMS)
Stage 7: Risk Analysis & Management (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is VAST ?

A

Visual, Agile, & Simple Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Differentiate Due Diligence & Due Care

A

Due Diligence is planning
Due Care is doing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Security Policy ?

A

Overview/Generalization of an organization’s security needs. Covers:
- Scope of the security needed
- Assets that need protection
- Extent to which security should go to protect assets
Security Policies are required to show due diligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are COBIT’s Six Principles?

A
  1. Provide Stakeholder Value
  2. Use a holistic approach
  3. Have a dynamic governance system
  4. Keep governance separate from management
  5. Tailor security to enterprise needs
  6. Use an end-to-end governance system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List some security frameworks

A
  • NIST 800-53 rev5 (Security & Privacy Controls for Information Systems and Organizations)
  • CIS (Center for Internet Security)
  • NIST Risk Management Framework (RMF)
  • NIST CSF (Cybersecurity Framework)
  • ISO 27000 series
  • ITIL (from the British Government)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who should lead an InfoSec Team?

A

A CISO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the key to any security plan?

A

Approval by Senior Management

17
Q

What are the three levels of security planning?

A

Strategic, Tactical, Operational

18
Q

What are some steps in reviewing potential security integration partners?

A
  • On-site assessment
  • Document Exchange & Review
  • Process Policy Review
  • 3rd-party audit
19
Q

What document from partners/vendors goes into your SLA?

A

SLR (Service Level Reporting)

20
Q

What is COBIT ?

A

Control Objectives for Information & Related Technology (From ISACA, the Information Systems Audit & Control Association)

21
Q

What are the sections of the CISSP Exam?

A
  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
22
Q
A